>Information Systems homework help
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. An originality report is provided when you submit your task that can be used as a guide.
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
A. Summarize Endothon’s outsourcing needs and expectations for the outsourcing vendor, based on the attached “Sourcing Plan Case Study” and “Request for Proposal.”
B. Identify the project sponsor, stakeholders, and steering committee based on information in the Endothon corporate profile, using the attached “Sourcing Plan Case Study.”
C. Summarize the strengths and weaknesses of the proposal from Bullzai Ltd. (Bullzai), noting any gaps in the vendor’s response to requirements specified in the attached “Request for Proposal.”
Note: Use the “Bullzai_Response to Request for Proposal” attached.
D. Summarize the strengths and weaknesses of the proposal from Synesthor Ltd. (Synesthor), noting any gaps in the vendor’s response to requirements specified in the attached “Request for Proposal.”
Note: Use the “Synesthor_Response to Request for Proposal” attached.
E. Identify which vendor you want to award the outsourcing contract to, justifying why that vendor was chosen.
F. Recommend modifications to the chosen vendor’s bid, amending key weaknesses and oversights in the selected vendor’s response to the RFP (i.e., the “Synesthor_Response to Request for Proposal” or the “Bullzai_Response to Request for Proposal” attachment) and justifying how the recommended modifications will benefit your company.
G. Summarize how a problem-solving negotiation strategy could be used to renegotiate the weaknesses and oversights identified in part F.
H. Recommend training to mitigate misunderstandings in cultural communication that may arise between Endothon and the chosen outsourcing vendor.
I. Explain technical and security challenges related to the country where your chosen vendor is located, including IT security, physical security, and the protection of intellectual property.
J. Explain how Encryption and Export Administration Regulations (EAR), Category 5, Parts 1 and 2 apply to communications between your company and your chosen vendor.
K. Acknowledge sources, using APA-formatted in-text citations and references, for content that is quoted, paraphrased, or summarized.
L. Demonstrate professional communication in the content and presentation of your submission.
-
NEP2_Task1Attach_SourcingPlanCaseStudy.docx
-
NEP2_Task1Attach_Bullzai_ResponsetoRequestforProposal.docx
-
NEP2_Task1Attach_RequestforProposal.docx
-
NEP2_Task1Attach_Synesthor_ResponsetoRequestforProposal.docx